National Repository of Grey Literature 25 records found  previous11 - 20next  jump to record: Search took 0.00 seconds. 
Experimental testbed for power side channel analysis
Gajdošík, Ester ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
This bachelor’s thesis focuses on the implementation of a Power side channel attack on three experimental workplaces with the implemented AES-128 encryption algorithm. For these purposes are used FPGA boards SAKURA G, SAKURA X and Chipwhisperer CW305. The theoretical part of the work is focused on the principles of side channel attacks, while the main emphasis is on power analysis and its two methods – simple (SPA) and differential (DPA). The aim of the practical part is to compare the waveforms obtained from workplaces using the TVLA (Test Vector Leakage Assessment) leakage detection methods.
Experimental testbed for power side channel analysis
Gajdošík, Ester ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
This bachelor’s thesis focuses on the implementation of a Power side channel attack on three experimental workplaces with the implemented AES-128 encryption algorithm. For these purposes are used FPGA boards SAKURA G, SAKURA X and Chipwhisperer CW305. The theoretical part of the work is focused on the principles of side channel attacks, while the main emphasis is on power analysis and its two methods – simple (SPA) and differential (DPA). The aim of the practical part is to compare the waveforms obtained from workplaces using the TVLA (Test Vector Leakage Assessment) leakage detection methods.
Application for automated power trace measurement
Karabina, Lukáš ; Lieskovan, Tomáš (referee) ; Gerlich, Tomáš (advisor)
Master’s thesis is focused on providing information for the design and implementation of an application for automated power trace measurement. The first and second sections of this thesis summarise the findings on the actual measurement of the power consumption and the use of the results in the analysis of the robustness of cryptographic systems against side channel attacks. In this sections, several methods that can be used in such an analysis are presented. A section on the devices with which the application will communicate is also included. The practical part of this thesis deals with the actual design and development of the application. The design patterns used and the procedures by which the application is created are presented. The individual subsections further describe the actual development, implementation, testing and associated problems.
Power Analysis On Present Lightweight Cipher And Hw Countermeasure
Hirš, David
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or emebeded devices. Nowadays, the popularity of Internet of Things (IoT) is growing therefore, designers sould implement cryptographic algorithms with countermeasures in order to defend against these types of attacks. The article focus on the implementation of ultra-lightweight block cipher PRESENT that using the hardware randomization as a countermeasures technique.
Hiding of current consumption
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or embedded devices. Nowadays, the popularity of Internet of Things (IoT) is growing therefore, designers sould implement cryptographic algorithms with countermeasures in order to defend against these types of attacks. The bachelor's thesis focus on the implementation of ultra-lightweight block cipher PRESENT and execution of Simple power analysis and Differential power analysis to reveal the secret key. Power analysis is firstly performed on cipher PRESENT with no implemented countermeasures and the attack was successful. Then the countermeasures were implemented and there were no leakage about the secret key. The countermeasures are using the hardware randomization of FPGA boards.
Statistical tests power analysis
Kubrycht, Pavel ; Malá, Ivana (advisor) ; Bílková, Diana (referee)
This Thesis deals with the power of a statistical test and the associated problem of determining the appropriate sample size. It should be large enough to meet the requirements of the probabilities of errors of both the first and second kind. The aim of this Thesis is to demonstrate theoretical methods that result in derivation of formulas for minimum sample size determination. For this Thesis, three important probability distributions have been chosen: Normal, Bernoulli, and Exponential.
Principal component analysis in power analysis
Jedlička, František ; Vlček, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with using principal component analysis in cryptanalysis by power side chanel. At first in this thesis is discussed cryptanalysis, cryptanalysis by power side chanel, principal component analysis method and interpretation received power consumption from performed differential power analysis on cryptographic device with AES algorithm. Practical part contain execution of own principal component analysis on received data and following try of differential power analysis thus adjusted data.
Countermeasures of power analysis
Gerlich, Tomáš ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
Side channels affect a security of the cryptographic systems, due to it is necessary to focus on implementation of the algorithm. There are mention basic classification of side channels in the beginning of the work. The following chapter describes types of countermeasures against side channel attack, which the most emphasis on masking, because of possible implementations on existing cryptosystems. Masking techniques are introduces in the following chapter, where is a description of their method of masking, treatment of cipher and their resistance against attack. The practical part describes the measurements that are trying to record the power consumption of the microcontroller. Measurement was designed to examine primarily on information leakage through power side channel.
Side channels - preparation of lab task
Holemář, Jan ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with side-channel cryptoanalysis. It is focused on power side-channel attack on cryptographic device. The smart card Gemalto .NET is used as the cryptographic device. This smart card performs encryption through algorithm RSA, DES, AES. The power consumption of the smart card was scanned by a Tektronix CT-6 current probe. Data obtained by measuring were processed on the computer with relevant software and provided important information about the encryption key that was used.
Power side channel
Zapletal, Ondřej ; Mácha, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with side-channel cryptoanalysis. It is focused on power side-channel attack on cryptographic device. The microcontroller PIC is used as the cryptographic device. This microcontroller performs encryption through the symmetrical algorithm AES. For the purpose of simple and differential power analysis, we designed and constructed an experimental printed circuit board. The power consumption of the microcontroller PIC working with instruction AddRoundKey and SubBytes was scanned by a Tektronix CT-6 current probe. Data obtained by measuring were processed on the computer with relevant software and provided important information about the encryption key that was used.

National Repository of Grey Literature : 25 records found   previous11 - 20next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.